On the Automated Correction of Security Protocols Susceptible to a Replay Attack.
Juan Carlos López PimentelRaúl MonroyDieter HutterPublished in: ESORICS (2007)
Keyphrases
- security protocols
- automated design
- cryptographic algorithms
- security services
- security properties
- artificial immune algorithm
- secure communication
- engineering design
- key management
- low cost
- evolutionary design
- security mechanisms
- cryptographic protocols
- authentication protocol
- mechanism design
- error correction
- data mining